This paper is devoted to investigate the effect of internal curing technique on the properties of self-compacting concrete. In this study, self-compacting concrete is produced by using limestone powder as partial replacement by weight of cement with percentage of (5%), sand is partially replaced by volume with saturated fine lightweight aggregate which is thermostone aggregate as internal curing material in three percentages of (5%, 10%, 15%) for self-compacting concrete, and the use of two external curing conditions which are water and air. The experimental work was divided into three parts: in the first part, the workability tests of fresh self-compacting concrete were conducted. The second part included conducting compressive strength test and modulus of rupture test at ages of (7, 28 and 90) days. The third part included doing the shrinkage test at age of (7, 14, 21, 28) days. The results show that internally cured self-compacting concrete has the best workability and the best properties of hardened concrete which include (compressive strength, modulus of rupture) of externally cured self-compacting concrete with both water and air as compared with reference concretes. Also, the hardened properties of internally cured self-compacting concrete with percentage of (5%) with thermostone aggregate is the best as compared with that of percentages (10% and 15%) in both external curing conditions. In general, the results of shrinkage test have shown reduction in shrinkage of internally cured self-compacting concrete as compared with reference concretes and this reduction increases with increase in the thermostone aggregate content-within-self-compacting-concrete.
This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat
... Show MoreFree-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThe research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc
... Show MoreLanguage is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana
... Show MoreThe economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show More